Results 31 to 40 of about 397,696 (287)
Procedure-modular specification and verification of temporal safety properties [PDF]
This paper describes ProMoVer, a tool for fully automated procedure-modular verification of Java programs equipped with method-local and global assertions that specify safety properties of sequences of method invocations.
Gurov, Dilian +2 more
core +3 more sources
Supporting software maintenance with non-functional information [PDF]
The paper highlights the role of non functional information (about efficiency, reliability and other software attributes) of software components in software maintenance, focusing in the component programming framework.
Botella López, Pere +1 more
core +1 more source
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
Differential Fault Analysis (DFA) is considered as the most popular fault analysis method. While there are techniques that provide a fault analysis automation on the cipher level to some degree, it can be shown that when it comes to software ...
Xiaolu Hou +3 more
doaj +1 more source
Efficient Implementation of SPEEDY Block Cipher on Cortex-M3 and RISC-V Microcontrollers
The SPEEDY block cipher family announced at the CHES 2021 shows excellent performance on hardware architectures. Due to the nature of the hardware-friendly design of SPEEDY, the algorithm has low performance for software implementations. In particular, 6-
Hyunjun Kim +3 more
doaj +1 more source
Benchmark data for verifying background model implementations in orbit and gravity field determination software [PDF]
In the framework of the COmbination Service for Time-variable Gravity fields (COST-G) gravity field solutions from different analysis centres are combined to provide a consolidated solution of improved quality and robustness to the user. As in many other
M. Lasser +11 more
doaj +1 more source
Photonic reservoir computing: a new approach to optical information processing [PDF]
Despite ever increasing computational power, recognition and classification problems remain challenging to solve. Recently advances have been made by the introduction of the new concept of reservoir computing.
Bienstman, Peter +5 more
core +2 more sources
The Resource constrained shortest path problem implemented in a lazy functional language [PDF]
The resource constrained shortest path problem is an NP-hard problem for which many ingenious algorithms have been developed. These algorithms are usually implemented in FORTRAN or another imperative programming language.
Glaser, Hugh, Hartel, Pieter H.
core +3 more sources
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra +3 more
wiley +1 more source
Background: The successful completion of clinical trials ultimately depends on realistic recruitment predictions. Statistical methods for recruitment prediction implemented in a free-of-charge open-source software could be routinely used by researchers ...
Philip Heesen, Malgorzata Roos
doaj +1 more source
IP-Level Satellite Link Emulation with KauNet [PDF]
Distributed applications and transport protocols communicating over a satellite link may react very strongly to conditions specific to that kind of link.
Bouabdallah, Amine +4 more
core +6 more sources

